Sciweavers

10077 search results - page 1862 / 2016
» Mobile Networking in the Internet
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
MUE
2007
IEEE
102views Multimedia» more  MUE 2007»
15 years 10 months ago
Ubiquitous Multimedia Information Delivering Service for Smart Home
In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Jenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang
COORDINATION
2007
Springer
15 years 10 months ago
Requirements for Routing in the Application Layer
In the application layer of networks, many application servers are middleboxes in the paths of messages from source to destination. Applications require, as a basic coordination me...
Pamela Zave
ESORICS
2007
Springer
15 years 10 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
MIDDLEWARE
2007
Springer
15 years 10 months ago
A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications
Abstract. The success of Internet telephony services like Skype illustrates the feasibility of utilizing unstructured Peer-to-Peer (P2P) networks as an economical platform for supp...
Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Gong...
« Prev « First page 1862 / 2016 Last » Next »